Search the dblp DataBase
Matthew K. Franklin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Matthew K. Franklin , Tomas Sander Commital Deniable Proofs and Electronic Campaign Finance. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:373-387 [Conf ] Dan Boneh , Matthew K. Franklin Anonymous Authentication with Subset Queries (extended abstract). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1999, pp:113-119 [Conf ] Glenn Durfee , Matthew K. Franklin Distribution chain security. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:63-70 [Conf ] Matthew K. Franklin , Michael K. Reiter Fair Exchange with a Semi-Trusted Third Party (extended abstract). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:1-5 [Conf ] Michael K. Reiter , Matthew K. Franklin , John B. Lacy , Rebecca N. Wright The Omega Key Management Service. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:38-47 [Conf ] Dan Boneh , Matthew K. Franklin Identity-Based Encryption from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:213-229 [Conf ] Dan Boneh , Matthew K. Franklin Efficient Generation of Shared RSA Keys (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:425-439 [Conf ] Dan Boneh , Matthew K. Franklin An Efficient Public Key Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:338-353 [Conf ] Matthew K. Franklin , Stuart Haber Joint Encryption and Message-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:266-277 [Conf ] Yevgeniy Dodis , Matthew K. Franklin , Jonathan Katz , Atsuko Miyaji , Moti Yung Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:19-32 [Conf ] Yevgeniy Dodis , Matthew K. Franklin , Jonathan Katz , Atsuko Miyaji , Moti Yung A Generic Construction for Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:81-98 [Conf ] Matthew K. Franklin , Mark Gondree , Payman Mohassel Improved Efficiency for Private Stable Matching. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:163-177 [Conf ] Dan Boneh , Glenn Durfee , Matthew K. Franklin Lower Bounds for Multicast Message Authentication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:437-452 [Conf ] Don Coppersmith , Matthew K. Franklin , Jacques Patarin , Michael K. Reiter Low-Exponent RSA with Related Messages. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:1-9 [Conf ] Ronald Cramer , Matthew K. Franklin , Berry Schoenmakers , Moti Yung Multi-Autority Secret-Ballot Elections with Linear Work. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:72-83 [Conf ] Matthew K. Franklin , Michael K. Reiter Verifiable Signature Sharing. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:50-63 [Conf ] Matthew K. Franklin , Rebecca N. Wright Secure Communications in Minimal Connectivity Models. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:346-360 [Conf ] Matthew K. Franklin , Moti Yung The Blinding of Weak Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:67-76 [Conf ] Matthew K. Franklin , Dahlia Malkhi Auditable Metering with Lightweight Security. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:151-160 [Conf ] Matthew K. Franklin , Gene Tsudik Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1998, pp:90-102 [Conf ] Matthew K. Franklin , Zvi Galil , Moti Yung Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems [Citation Graph (0, 0)][DBLP ] FOCS, 1993, pp:670-679 [Conf ] Matthew K. Franklin , Moti Yung Secure and Efficient Off-Line Digital Money (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ICALP, 1993, pp:265-276 [Conf ] Armen Gabrielian , Matthew K. Franklin Multi-Level Specification and Verification of Real-Time Software. [Citation Graph (0, 0)][DBLP ] ICSE, 1990, pp:52-62 [Conf ] Tom Berson , Drew Dean , Matthew K. Franklin , Diana K. Smetters , Mike Spreitzer Cryptology As a Network Service. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Drew Dean , Matthew K. Franklin , Adam Stubblefield An Algebraic Approach to IP Traceback. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Payman Mohassel , Matthew K. Franklin Efficient Polynomial Operations in the Shared-Coefficients Setting. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:44-57 [Conf ] Payman Mohassel , Matthew K. Franklin Efficiency Tradeoffs for Malicious Two-Party Computation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:458-473 [Conf ] Matthew K. Franklin , Armen Gabrielian A Transformational Method for Verifying Safety Properties in Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1989, pp:112-125 [Conf ] Armen Gabrielian , Matthew K. Franklin State-Based Specification of Complex Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1988, pp:2-11 [Conf ] Amos Beimel , Matthew K. Franklin Edge Eavesdropping Games. [Citation Graph (0, 0)][DBLP ] SCN, 2006, pp:1-17 [Conf ] Bernardo A. Huberman , Matthew K. Franklin , Tad Hogg Enhancing privacy and trust in electronic communities. [Citation Graph (0, 0)][DBLP ] ACM Conference on Electronic Commerce, 1999, pp:78-86 [Conf ] Harry Buhrman , Matthew K. Franklin , Juan A. Garay , Jaap-Henk Hoepman , John Tromp , Paul M. B. Vitányi Mutual Search (Extended Abstract). [Citation Graph (0, 0)][DBLP ] SODA, 1998, pp:481-489 [Conf ] Jessica Staddon , Sara K. Miner , Matthew K. Franklin , Dirk Balfanz , Michael Malkin , Drew Dean Self-Healing Key Distribution with Revocation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:241-257 [Conf ] Matthew K. Franklin , Moti Yung Communication Complexity of Secure Computation (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1992, pp:699-710 [Conf ] Matthew K. Franklin , Moti Yung Secure hypergraphs: privacy from partial broadcast (Extended Abstract). [Citation Graph (0, 0)][DBLP ] STOC, 1995, pp:36-44 [Conf ] Matthias Fitzi , Matthew K. Franklin , Juan A. Garay , S. Harsha Vardhan Towards Optimal and Efficient Perfectly Secure Message Transmission. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:311-322 [Conf ] Amos Beimel , Matthew K. Franklin Weakly-Private Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:253-272 [Conf ] Eike Kiltz , Payman Mohassel , Enav Weinreb , Matthew K. Franklin Secure Linear Algebra Using Linearly Recurrent Sequences. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:291-310 [Conf ] Amos Beimel , Matthew K. Franklin Reliable Communication over Partially Authenticated Networks. [Citation Graph (0, 0)][DBLP ] WDAG, 1997, pp:245-259 [Conf ] Matthew K. Franklin , Juan A. Garay , Moti Yung Self-Testing/Correcting Protocols (Extended Abstract). [Citation Graph (0, 0)][DBLP ] DISC, 1999, pp:269-283 [Conf ] Armen Gabrielian , Matthew K. Franklin Multilevel Specification of Real Time Systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:5, pp:50-60 [Journal ] Harry Buhrman , Matthew K. Franklin , Juan A. Garay , Jaap-Henk Hoepman , John Tromp , Paul M. B. Vitányi Mutual Search [Citation Graph (0, 0)][DBLP ] CoRR, 1999, v:0, n:, pp:- [Journal ] Harry Buhrman , Matthew K. Franklin , Juan A. Garay , Jaap-Henk Hoepman , John Tromp , Paul M. B. Vitányi Mutual Search. [Citation Graph (0, 0)][DBLP ] J. ACM, 1999, v:46, n:4, pp:517-536 [Journal ] Dan Boneh , Matthew K. Franklin Efficient generation of shared RSA keys. [Citation Graph (0, 0)][DBLP ] J. ACM, 2001, v:48, n:4, pp:702-722 [Journal ] Matthew K. Franklin , Zvi Galil , Moti Yung Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. [Citation Graph (0, 0)][DBLP ] J. ACM, 2000, v:47, n:2, pp:225-243 [Journal ] Matthew K. Franklin , Dahlia Malkhi Auditable Metering with Lightweight Security. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1998, v:6, n:4, pp:237-256 [Journal ] Michael K. Reiter , Matthew K. Franklin , John B. Lacy , Rebecca N. Wright The Omega Key Management Service. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:4, pp:267-288 [Journal ] Jeffrey Considine , Matthias Fitzi , Matthew K. Franklin , Leonid A. Levin , Ueli M. Maurer , David Metcalf Byzantine Agreement Given Partial Broadcast. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2005, v:18, n:3, pp:191-217 [Journal ] Matthew K. Franklin , Stuart Haber Joint Encryption and Message-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1996, v:9, n:4, pp:217-232 [Journal ] Matthew K. Franklin , Rebecca N. Wright Secure Communication in Minimal Connectivity Models. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2000, v:13, n:1, pp:9-30 [Journal ] Dan Boneh , Matthew K. Franklin Identity-Based Encryption from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2003, v:32, n:3, pp:586-615 [Journal ] Matthew K. Franklin , Moti Yung Secure Hypergraphs: Privacy from Partial Broadcast. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 2004, v:18, n:3, pp:437-450 [Journal ] Amos Beimel , Matthew K. Franklin Reliable Communication over Partially Authenticated Networks. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:220, n:1, pp:185-210 [Journal ] Drew Dean , Matthew K. Franklin , Adam Stubblefield An algebraic approach to IP traceback. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:119-137 [Journal ] Matthew K. Franklin , Michael K. Reiter The Design and Implementation of a Secure Auction Service. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:302-312 [Journal ] Matthew K. Franklin , Mark Gondree , Payman Mohassel Multi-party Indirect Indexing and Applications. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:283-297 [Conf ] Fair Threshold Decryption with Semi-Trusted Third Parties. [Citation Graph (, )][DBLP ] Efficient and Secure Evaluation of Multivariate Polynomials and Applications. [Citation Graph (, )][DBLP ] Communication-Efficient Private Protocols for Longest Common Subsequence. [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.011secs